Login / Signup
Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme.
Takeshi Shingu
Keiichi Iwamura
Kitahiro Kaneda
Published in:
DCNET (2016)
Keyphrases
</>
secret sharing scheme
key management
secret sharing
visual cryptography
resource constrained
visual cryptography scheme
wireless sensor networks
ad hoc networks
encryption scheme
multiscale
image processing
elliptic curve
real time
black and white
security analysis
secret image